{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T02:37:09Z","timestamp":1648867029865},"reference-count":71,"publisher":"Elsevier","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1016\/b978-0-12-410464-8.00013-1","type":"book-chapter","created":{"date-parts":[[2014,6,23]],"date-time":"2014-06-23T15:11:47Z","timestamp":1403536307000},"page":"297-321","source":"Crossref","is-referenced-by-count":1,"title":["The Design Implications of Users\u2019 Values for Software and System Architecture"],"prefix":"10.1016","author":[{"given":"Alistair","family":"Sutcliffe","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Thew","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib1","series-title":"Small Groups as Complex Systems: Formation, Coordination, Development and Adaptation","author":"Arrow","year":"2000"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib2","series-title":"Deriving Architectural Tactics: A Step Towards Methodical Architectural Design","author":"Bachman","year":"2003"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib3","series-title":"Relating Software Requirements and Architectures","first-page":"183","article-title":"Business goals and architecture","author":"Bass","year":"2011"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib4","series-title":"Software Architecture in Practice","author":"Bass","year":"2003"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib5","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/s007660200011","article-title":"Large-scale requirements analysis revisited: the need for understanding the political ecology of requirements engineering","volume":"7","author":"Bergman","year":"2002","journal-title":"Req. Eng."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib6","series-title":"The Impact of Systems Change in Organisations","author":"Bjorn-Andersen","year":"1979"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib7","series-title":"Systems Thinking, Systems Practice","author":"Checkland","year":"1999"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib8","series-title":"Relating Software Requirements and Architectures","first-page":"91","article-title":"Goal-oriented software architecting","author":"Chung","year":"2011"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib9","series-title":"Supporting Worth Mapping with Sentence Completion (LNCS, 5727)","author":"Cockton","year":"2009"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib10","series-title":"The Experience of Work: A Compendium and Review of 249 Measures and their Use","author":"Cook","year":"1982"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib11","series-title":"Patterns: Service-Oriented Architecture and Web Services","author":"Endrei","year":"2004"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib12","series-title":"Proceedings of the 8th International Workshop on Software Specification and Design","article-title":"A comedy of errors: the london ambulance service case study","author":"Finkelstein","year":"2006"},{"issue":"2","key":"10.1016\/B978-0-12-410464-8.00013-1_bib13","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/BF00872289","article-title":"Domain-oriented design environments","volume":"1","author":"Fischer","year":"1994","journal-title":"Autom. Softw. Eng."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib14","series-title":"Proceedings of the HCI 93 Conference","article-title":"Beyond human computer interaction: designing useful and usable computational environments","author":"Fischer","year":"2003"},{"issue":"9","key":"10.1016\/B978-0-12-410464-8.00013-1_bib15","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1015864.1015884","article-title":"A framework for end-user development: socio-technical perspectives and meta-design","volume":"47","author":"Fischer","year":"2004","journal-title":"Commun. ACM"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib16","series-title":"Analysis Patterns: Reusable Object Models","author":"Fowler","year":"1997"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib17","series-title":"Liberating Voices: A Pattern Language for Communication Revolution","first-page":"366","article-title":"Value-sensitive design","author":"Friedman","year":"2008"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib18","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s00766-009-0087-7","article-title":"Understanding the human context in requirements elicitation","volume":"15","author":"Fuentes-Fernadez","year":"2010","journal-title":"Req. Eng."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib19","series-title":"Exploring Requirements:Quality Before Design","author":"Gause","year":"1989"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib20","series-title":"Requirements Engineering: Social and Technical Issues","first-page":"165","article-title":"Requirements engineering as the reconciliation of social and technical issues","author":"Gougen","year":"1994"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib21","first-page":"114","article-title":"Value-based requirements engineering: exploring innovative e-commerce ideas","volume":"8","author":"Gordijn","year":"2002","journal-title":"Req. Eng."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib22","series-title":"Proceedings 12th IEEE International Conference on Requirements Engineering","article-title":"The effect of trust assumptions on the elaboration of security requirements","author":"Haley","year":"2004"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib23","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.jss.2006.05.024","article-title":"A general model of software architecture design derived from five industrial approaches","volume":"80","author":"Hofmeister","year":"2007","journal-title":"J. Syst. Softw."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib24","series-title":"Value-Focused Thinking: A Path to Creative Decision Making","author":"Keeney","year":"1992"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib25","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/0377-2217(96)00004-5","article-title":"Value-focused thinking: identifying decision opportunities and creating alternatives","volume":"92","author":"Keeney","year":"1996","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib26","series-title":"SAP\/R3 Process Oriented Implementation","author":"Keller","year":"1998"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib27","series-title":"Towards a General Theory of Action","article-title":"Value and value-orientations in the theory of action","author":"Kluckhohn","year":"1951"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib28","series-title":"Proceedings of the 19th IEEE International Requirements Engineering Conference","article-title":"Integrating analysis of customers\u2019 processes into roadmapping: the value-creation perspective","author":"Komssi","year":"2011"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib29","series-title":"The Rational Unified Process: An Introduction","author":"Kruchten","year":"2003"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib30","series-title":"Advanced Information Systems Engineering (1789)","article-title":"How culture might impact on the implementation of enterprise resource planning packages","author":"Krumbholz","year":"2000"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib31","series-title":"Motivation and Personality","author":"Maslow","year":"1987"},{"issue":"2","key":"10.1016\/B978-0-12-410464-8.00013-1_bib32","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1111\/j.1467-6494.1992.tb00970.x","article-title":"An introduction to the five-factor model and its applications","volume":"60","author":"McCrae","year":"1992","journal-title":"J. Pers."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib33","series-title":"Proceedings 19th IEEE International Requirements Engineering Conference","article-title":"Power and politics in requirements engineering: a proposed research agenda","author":"Milne","year":"2011"},{"issue":"3","key":"10.1016\/B978-0-12-410464-8.00013-1_bib34","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1504\/IJMED.2007.012679","article-title":"Enterprise Resource Planning (ERP): A review of the literature","volume":"4","author":"Moon","year":"2007","journal-title":"Int. J. Manage. Enterp. Dev."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib35","series-title":"Values, Technology and Work","author":"Mumford","year":"1981"},{"issue":"3","key":"10.1016\/B978-0-12-410464-8.00013-1_bib36","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/2.910904","article-title":"Weaving together requirements and architecture","volume":"34","author":"Nuseibeh","year":"2001","journal-title":"IEEE Comput."},{"issue":"10","key":"10.1016\/B978-0-12-410464-8.00013-1_bib37","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1002\/cpe.993","article-title":"Taverna: lessons in creating a workflow environment for the life sciences","volume":"18","author":"Oinn","year":"2006","journal-title":"Concurrency Comput. Pract. Exp."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib38","series-title":"Software Product Line Engineering: Foundations, Principles, and Techniques","author":"Pohl","year":"2005"},{"issue":"3","key":"10.1016\/B978-0-12-410464-8.00013-1_bib39","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/s00766-005-0014-5","article-title":"Is emotion relevant to requirements engineering?","volume":"10","author":"Ramos","year":"2005","journal-title":"Req. Eng."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib40","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59140-673-0.ch003","article-title":"Social construction of information technology supporting work","author":"Ramos","year":"2005","journal-title":"J. Cases Inform. Technol. L2"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib71","series-title":"Proceedings First International Conference, SoftWare (LNCS, 2311)","article-title":"The role of emotion, values, and beliefs in the construction of innovative work realities","author":"Ramos","year":"2002"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib41","series-title":"Proceedings 12th IEEE International Requirements Engineering Conference","article-title":"Architecture-driven problem decomposition","author":"Rapanotti","year":"2004"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib42","series-title":"Agentsheets: A Tool for Building Domain Oriented-Dynamic Visual Environments","author":"Repenning","year":"1993"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib43","series-title":"Introduction to Value Theory","author":"Rescher","year":"1969"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib44","series-title":"Mastering the Requirements Process","author":"Robertson","year":"1999"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib45","series-title":"The Nature of Human Values","author":"Rokeach","year":"1973"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib46","series-title":"Proceedings RE-10","article-title":"Requirements-aware systems: a research agenda for RE for self-adaptive systems","author":"Sawyer","year":"2010"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib47","series-title":"The Psychology of Values: The Ontario Symposium, 8","article-title":"Value priorities and behavior: applying a theory of integrated value systems","author":"Schwartz","year":"1996"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib48","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1037\/0022-3514.58.5.878","article-title":"Toward a theory of the universal content and structure of values: extensions and cross-cultural replications","volume":"58","author":"Schwartz","year":"1990","journal-title":"J. Per. Soc. Psychol."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib49","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1037\/0022-3514.80.2.325","article-title":"What is satisfying about satisfying events? Testing 10 candidate psychological needs","volume":"80","author":"Sheldon","year":"2001","journal-title":"J. Per. Soc. Psychol."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib50","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1002\/(SICI)1099-1050(199709)6:5<515::AID-HEC292>3.0.CO;2-N","article-title":"Values and preferences are not necessarily the same","volume":"6","author":"Shiell","year":"1997","journal-title":"Health Econ."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib51","series-title":"IBM Rational Unified Process Reference and Certification Guide: Solution Designer (RUP)","author":"Shuja","year":"2007"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib52","series-title":"Requirements Engineering: A Good Practice Guide","author":"Sommerville","year":"1997"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib53","unstructured":"Sourceforge, 2012. . (Accessed 22.02.2013.)."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib54","series-title":"Proceedings of SEAMS-11, 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems","article-title":"Awareness requirements for adaptive systems","author":"Souza","year":"2011"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib55","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/BF02802920","article-title":"Scenario-based requirements analysis","volume":"3","author":"Sutcliffe","year":"1998","journal-title":"Req. Eng."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib56","series-title":"The Domain Theory: Patterns for Knowledge and Software Reuse","author":"Sutcliffe","year":"2002"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib57","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s10515-008-0029-5","article-title":"The socio-economics of software architecture","volume":"15","author":"Sutcliffe","year":"2008","journal-title":"J. Autom. Softw. Eng."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib58","series-title":"Synthesis Lectures on Human Centered Informatics","article-title":"Designing for user engagement: aesthetic and attractive user interfaces","author":"Sutcliffe","year":"2009"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib59","series-title":"i* Requirements Modelling","first-page":"1139","article-title":"Analysing the effectiveness of human activity systems with i*","author":"Sutcliffe","year":"2010"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib60","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s00766-006-0030-0","article-title":"PC-RE: a method for personal and contextual requirements engineering with some experience","volume":"11","author":"Sutcliffe","year":"2006","journal-title":"Req. Eng."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib61","series-title":"Proceedings 8th IEEE International Conference on Requirements Engineering","article-title":"Investigating the role of soft issues in the RE process","author":"Thew","year":"2008"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib62","series-title":"Proceedings, 16th IEEE International Requirements Engineering Conference RE 2008","article-title":"Experience in e-science requirements engineering","author":"Thew","year":"2008"},{"issue":"1","key":"10.1016\/B978-0-12-410464-8.00013-1_bib63","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MS.2009.19","article-title":"Requirements engineering for e-science: experiences in epidemiology","volume":"26","author":"Thew","year":"2009","journal-title":"IEEE Softw."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib64","series-title":"Requirements Engineering: From System Goals to UML Models to Software Specifications","author":"Van Lamsweerde","year":"2009"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib65","series-title":"Proceedings Software Product Lines, Third International Conference, SPLC 2004","article-title":"Software product family evaluation","author":"Van der Linden","year":"2004"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib66","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/359205.359223","article-title":"Trust (and mistrust) in secure applications","volume":"44","author":"Viega","year":"2001","journal-title":"Commun. ACM"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib67","unstructured":"Wikipedia, 2013. List of free and open-source software packages. (accessed 22.02.13.)."},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib68","series-title":"Change and Stability in Values and Value Systems: A Sociological Perspective","first-page":"15","article-title":"Understanding human values","author":"Williams","year":"1979"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib69","series-title":"Software Requirement Patterns","author":"Withall","year":"2007"},{"key":"10.1016\/B978-0-12-410464-8.00013-1_bib70","series-title":"Conceptual Modeling: Foundations and Applications: Essays in Honor of John Mylopoulos (LNCS, 5600)","first-page":"99","article-title":"Social modelling and i*","author":"Yu","year":"2009"}],"container-title":["Economics-Driven Software Architecture"],"original-title":[],"link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780124104648000131?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780124104648000131?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,10,3]],"date-time":"2018-10-03T01:21:05Z","timestamp":1538529665000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780124104648000131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":71,"URL":"http:\/\/dx.doi.org\/10.1016\/b978-0-12-410464-8.00013-1","relation":{},"published":{"date-parts":[[2014]]}}}